- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 179 for x509 (0.08 sec)
-
security/pkg/pki/util/keycertbundle.go
// Verify the cert can be verified from the root cert through the cert chain. rcp := x509.NewCertPool() rcp.AppendCertsFromPEM(rootCertBytes) icp := x509.NewCertPool() icp.AppendCertsFromPEM(certChainBytes) opts := x509.VerifyOptions{ Intermediates: icp, Roots: rcp, } cert, err := ParsePemEncodedCertificate(certBytes) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 10.5K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/renewal/readwriter_test.go
func writeTestKubeconfig(t *testing.T, dir, name string, caCert *x509.Certificate, caKey crypto.Signer, notBefore, notAfter time.Time) *x509.Certificate { cfg := &pkiutil.CertConfig{ Config: certutil.Config{ CommonName: "test-common-name", Organization: testCertOrganization, Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, AltNames: certutil.AltNames{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 30 15:17:24 UTC 2024 - 9.5K bytes - Viewed (0) -
api/go1.22.txt
pkg cmp, func Or[$0 comparable](...$0) $0 #60204 pkg crypto/x509, func OIDFromInts([]uint64) (OID, error) #60665 pkg crypto/x509, method (*CertPool) AddCertWithConstraint(*Certificate, func([]*Certificate) error) #57178 pkg crypto/x509, method (OID) Equal(OID) bool #60665 pkg crypto/x509, method (OID) EqualASN1OID(asn1.ObjectIdentifier) bool #60665 pkg crypto/x509, method (OID) String() string #60665 pkg crypto/x509, type Certificate struct, Policies []OID #60665
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Jan 24 20:54:27 UTC 2024 - 7.7K bytes - Viewed (0) -
doc/godebug.md
Go 1.23 changed the behavior of [crypto/x509.ParseCertificate](/pkg/crypto/x509/#ParseCertificate) to reject serial numbers that are negative. This change can be reverted with the [`x509negativeserial` setting](/pkg/crypto/x509/#ParseCertificate). Go 1.23 changed the behavior of [crypto/x509.ParseCertificate](/pkg/crypto/x509/#ParseCertificate) to reject
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 30 17:52:17 UTC 2024 - 15.9K bytes - Viewed (0) -
cmd/kubeadm/app/componentconfigs/kubelet.go
if kc.config.Authentication.X509.ClientCAFile == "" { kc.config.Authentication.X509.ClientCAFile = clientCAFile } else if kc.config.Authentication.X509.ClientCAFile != clientCAFile { warnDefaultComponentConfigValue(kind, "authentication.x509.clientCAFile", clientCAFile, kc.config.Authentication.X509.ClientCAFile) } if kc.config.Authentication.Anonymous.Enabled == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 07:10:31 UTC 2024 - 8K bytes - Viewed (0) -
cmd/kubeadm/app/util/config/cluster.go
return "", errors.Errorf("invalid kubeconfig file %s: missing AuthInfo %s", fileName, currentContext.AuthInfo) } // gets the X509 certificate with current user credentials var certs []*x509.Certificate if len(authInfo.ClientCertificateData) > 0 { // if the config file uses an embedded x509 certificate (e.g. kubelet.conf created by kubeadm), parse it if certs, err = certutil.ParseCertsPEM(authInfo.ClientCertificateData); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 11:04:08 UTC 2024 - 11K bytes - Viewed (0) -
src/crypto/tls/key_agreement.go
// This method may not be called if the server doesn't send a // ServerKeyExchange message. processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) } var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 11.8K bytes - Viewed (0) -
security/pkg/k8s/chiron/utils.go
} // Verify the certificate chain before returning the certificate roots := x509.NewCertPool() if roots == nil { return nil, nil, fmt.Errorf("failed to create cert pool") } if ok := roots.AppendCertsFromPEM(caCert); !ok { return nil, nil, fmt.Errorf("failed to append CA certificate") } intermediates := x509.NewCertPool() if len(certsParsed) > 1 { for _, cert := range certsParsed[1:] {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 05 18:11:22 UTC 2024 - 9.2K bytes - Viewed (0) -
security/pkg/pki/util/crypto_test.go
errMsg string pem string publicKeyAlgo x509.PublicKeyAlgorithm }{ "Invalid PEM string": { errMsg: "invalid PEM encoded certificate", pem: "invalid pem string", }, "Invalid certificate string": { errMsg: "failed to parse X.509 certificate", pem: keyECDSA, }, "Parse RSA certificate": { publicKeyAlgo: x509.RSA, pem: certRSA, },
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 14.6K bytes - Viewed (0) -
tests/integration/ambient/cacert_rotation_test.go
return nil } func getX509FromFile(t framework.TestContext, caCertFile string) *x509.Certificate { certBytes, err := cert.ReadSampleCertFromFile(caCertFile) if err != nil { t.Errorf("failed to read %s file: %v", caCertFile, err) } return parseCert(t, certBytes) } func parseCert(t framework.TestContext, certBytes []byte) *x509.Certificate { parsedCert, err := util.ParsePemEncodedCertificate(certBytes)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 16 03:28:36 UTC 2024 - 6.1K bytes - Viewed (0)